General

  • Target

    2024-02-22_34a3a5dbfb701a8ec67ec1c34c8d73d8_cryptolocker

  • Size

    55KB

  • MD5

    34a3a5dbfb701a8ec67ec1c34c8d73d8

  • SHA1

    08f785ebdfd965d0896c5ebbff0c8450bd797d7a

  • SHA256

    d4c330b11b618742bef59bf07e4fce457f9e2072a9c8d7f9544a8ace74b33217

  • SHA512

    302f767593e47faca86c3f75d8684ba16a4eb7ca4425429d5c9a83d4789cf68b002f6eef2ce1f42ca781d9c536a8b167cffc0034324706f2e27e6cfbfc2b8ba3

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61e:BbdDmjr+OtEvwDpjMU

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_34a3a5dbfb701a8ec67ec1c34c8d73d8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections